Skip to content

Commit 5b0562f

Browse files
committed
wip: disable few post-start functions that are done in snc
1 parent 9d17fbb commit 5b0562f

File tree

4 files changed

+17
-78
lines changed

4 files changed

+17
-78
lines changed

pkg/crc/cluster/cluster.go

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -233,13 +233,10 @@ func EnsureGeneratedClientCAPresentInTheCluster(ctx context.Context, ocConfig oc
233233
}
234234

235235
logging.Info("Updating root CA cert to admin-kubeconfig-client-ca configmap...")
236-
jsonPath := fmt.Sprintf(`'{"data": {"ca-bundle.crt": %q}}'`, selfSignedCAPem)
237-
cmdArgs := []string{"patch", "configmap", "admin-kubeconfig-client-ca",
238-
"-n", "openshift-config", "--patch", jsonPath}
239-
_, stderr, err = ocConfig.RunOcCommand(cmdArgs...)
240-
if err != nil {
241-
return fmt.Errorf("Failed to patch admin-kubeconfig-client-ca config map with new CA` %v: %s", err, stderr)
236+
if err := sshRunner.CopyData(selfSignedCAPem, "/opt/crc/custom-ca.crt", 0644); err != nil {
237+
return fmt.Errorf("Failed to copy generated CA file to VM: %v", err)
242238
}
239+
243240
if err := sshRunner.CopyFile(constants.KubeconfigFilePath, ocConfig.KubeconfigPath, 0644); err != nil {
244241
return fmt.Errorf("Failed to copy generated kubeconfig file to VM: %v", err)
245242
}

pkg/crc/cluster/kubeadmin_password.go

Lines changed: 4 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ import (
1313

1414
"github.com/crc-org/crc/v2/pkg/crc/constants"
1515
"github.com/crc-org/crc/v2/pkg/crc/logging"
16-
"github.com/crc-org/crc/v2/pkg/crc/oc"
16+
"github.com/crc-org/crc/v2/pkg/crc/ssh"
1717
"golang.org/x/crypto/bcrypt"
1818
)
1919

@@ -29,7 +29,7 @@ func GenerateKubeAdminUserPassword() error {
2929
}
3030

3131
// UpdateKubeAdminUserPassword updates the htpasswd secret
32-
func UpdateKubeAdminUserPassword(ctx context.Context, ocConfig oc.Config, newPassword string) error {
32+
func UpdateKubeAdminUserPassword(ctx context.Context, sshRunner *ssh.Runner, newPassword string) error {
3333
if newPassword != "" {
3434
logging.Infof("Overriding password for kubeadmin user")
3535
if err := os.WriteFile(constants.GetKubeAdminPasswordPath(), []byte(strings.TrimSpace(newPassword)), 0600); err != nil {
@@ -41,39 +41,14 @@ func UpdateKubeAdminUserPassword(ctx context.Context, ocConfig oc.Config, newPas
4141
if err != nil {
4242
return fmt.Errorf("Cannot read the kubeadmin user password from file: %w", err)
4343
}
44-
credentials := map[string]string{
45-
"developer": "developer",
46-
"kubeadmin": kubeAdminPassword,
47-
}
4844

49-
if err := WaitForOpenshiftResource(ctx, ocConfig, "secret"); err != nil {
45+
if err := sshRunner.CopyDataPrivileged([]byte(kubeAdminPassword), "/opt/crc/pass_kubeadmin", 0600); err != nil {
5046
return err
5147
}
5248

53-
given, stderr, err := ocConfig.RunOcCommandPrivate("get", "secret", "htpass-secret", "-n", "openshift-config", "-o", `jsonpath="{.data.htpasswd}"`)
54-
if err != nil {
55-
return fmt.Errorf("%s:%v", stderr, err)
56-
}
57-
ok, externals, err := compareHtpasswd(given, credentials)
58-
if err != nil {
49+
if err := sshRunner.CopyDataPrivileged([]byte("developer"), "/opt/crc/pass_developer", 0600); err != nil {
5950
return err
6051
}
61-
if ok {
62-
return nil
63-
}
64-
65-
logging.Infof("Changing the password for the kubeadmin user")
66-
expected, err := getHtpasswd(credentials, externals)
67-
if err != nil {
68-
return err
69-
}
70-
cmdArgs := []string{"patch", "secret", "htpass-secret", "-p",
71-
fmt.Sprintf(`'{"data":{"htpasswd":"%s"}}'`, expected),
72-
"-n", "openshift-config", "--type", "merge"}
73-
_, stderr, err = ocConfig.RunOcCommandPrivate(cmdArgs...)
74-
if err != nil {
75-
return fmt.Errorf("Failed to update kubeadmin password %v: %s", err, stderr)
76-
}
7752
return nil
7853
}
7954

pkg/crc/machine/start.go

Lines changed: 10 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -427,11 +427,6 @@ func (client *client) Start(ctx context.Context, startConfig types.StartConfig)
427427
return nil, errors.Wrap(err, "Error updating public key")
428428
}
429429

430-
// Trigger disk resize, this will be a no-op if no disk size change is needed
431-
if err := growRootFileSystem(sshRunner, startConfig.Preset, startConfig.PersistentVolumeSize); err != nil {
432-
return nil, errors.Wrap(err, "Error updating filesystem size")
433-
}
434-
435430
// Start network time synchronization if `CRC_DEBUG_ENABLE_STOP_NTP` is not set
436431
if stopNtp, _ := strconv.ParseBool(os.Getenv("CRC_DEBUG_ENABLE_STOP_NTP")); stopNtp {
437432
logging.Info("Stopping network time synchronization in CRC VM")
@@ -542,6 +537,15 @@ func (client *client) Start(ctx context.Context, startConfig types.StartConfig)
542537
return nil, errors.Wrap(err, "Failed to check certificate validity")
543538
}
544539

540+
// copy the pull secret into /opt/crc/pull-secret in the instance
541+
pullSecret, err := startConfig.PullSecret.Value()
542+
if err != nil {
543+
return nil, err
544+
}
545+
if err := sshRunner.CopyDataPrivileged([]byte(pullSecret), "/opt/crc/pull-secret", 0600); err != nil {
546+
return nil, errors.Wrap(err, "Unable to send pull-secret to instance")
547+
}
548+
545549
logging.Info("Starting kubelet service")
546550
sd := systemd.NewInstanceSystemdCommander(sshRunner)
547551
if err := sd.Start("kubelet"); err != nil {
@@ -567,10 +571,6 @@ func (client *client) Start(ctx context.Context, startConfig types.StartConfig)
567571
return nil, err
568572
}
569573

570-
if err := cluster.EnsurePullSecretPresentInTheCluster(ctx, ocConfig, startConfig.PullSecret); err != nil {
571-
return nil, errors.Wrap(err, "Failed to update cluster pull secret")
572-
}
573-
574574
if err := cluster.EnsureSSHKeyPresentInTheCluster(ctx, ocConfig, constants.GetPublicKeyPath()); err != nil {
575575
return nil, errors.Wrap(err, "Failed to update ssh public key to machine config")
576576
}
@@ -579,20 +579,10 @@ func (client *client) Start(ctx context.Context, startConfig types.StartConfig)
579579
return nil, errors.Wrap(err, "Failed to update pull secret on the disk")
580580
}
581581

582-
if err := cluster.UpdateKubeAdminUserPassword(ctx, ocConfig, startConfig.KubeAdminPassword); err != nil {
582+
if err := cluster.UpdateKubeAdminUserPassword(ctx, sshRunner, startConfig.KubeAdminPassword); err != nil {
583583
return nil, errors.Wrap(err, "Failed to update kubeadmin user password")
584584
}
585585

586-
if err := cluster.EnsureClusterIDIsNotEmpty(ctx, ocConfig); err != nil {
587-
return nil, errors.Wrap(err, "Failed to update cluster ID")
588-
}
589-
590-
if client.useVSock() {
591-
if err := ensureRoutesControllerIsRunning(sshRunner, ocConfig); err != nil {
592-
return nil, err
593-
}
594-
}
595-
596586
if client.monitoringEnabled() {
597587
logging.Info("Enabling cluster monitoring operator...")
598588
if err := cluster.StartMonitoring(ocConfig); err != nil {

pkg/crc/services/dns/dns.go

Lines changed: 0 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,6 @@ import (
1414
"github.com/crc-org/crc/v2/pkg/crc/network"
1515
"github.com/crc-org/crc/v2/pkg/crc/network/httpproxy"
1616
"github.com/crc-org/crc/v2/pkg/crc/services"
17-
"github.com/crc-org/crc/v2/pkg/crc/systemd"
18-
"github.com/crc-org/crc/v2/pkg/crc/systemd/states"
1917
)
2018

2119
const (
@@ -28,10 +26,6 @@ func init() {
2826
}
2927

3028
func RunPostStart(serviceConfig services.ServicePostStartConfig) error {
31-
if err := setupDnsmasq(serviceConfig); err != nil {
32-
return err
33-
}
34-
3529
if err := runPostStartForOS(serviceConfig); err != nil {
3630
return err
3731
}
@@ -44,23 +38,6 @@ func RunPostStart(serviceConfig services.ServicePostStartConfig) error {
4438
return network.UpdateResolvFileOnInstance(serviceConfig.SSHRunner, resolvFileValues)
4539
}
4640

47-
func setupDnsmasq(serviceConfig services.ServicePostStartConfig) error {
48-
if serviceConfig.NetworkMode == network.UserNetworkingMode {
49-
return nil
50-
}
51-
52-
if err := createDnsmasqDNSConfig(serviceConfig); err != nil {
53-
return err
54-
}
55-
sd := systemd.NewInstanceSystemdCommander(serviceConfig.SSHRunner)
56-
if state, err := sd.Status(dnsmasqService); err != nil || state != states.Running {
57-
if err := sd.Enable(dnsmasqService); err != nil {
58-
return err
59-
}
60-
}
61-
return sd.Start(dnsmasqService)
62-
}
63-
6441
func getResolvFileValues(serviceConfig services.ServicePostStartConfig) (network.ResolvFileValues, error) {
6542
dnsServers, err := dnsServers(serviceConfig)
6643
if err != nil {

0 commit comments

Comments
 (0)